Hybrid fuzzy integrated convolutional neural network (HFICNN) for similarity feature recognition problem in abnormal netflow detection
暂无分享,去创建一个
Wei Huang | Xin Yue | Jinsong Wang | Wei Huang | Jinsong Wang | Xin Yue
[1] Jisa David,et al. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic , 2019, Comput. Secur..
[2] Jie Li,et al. Discriminative dictionary pair learning based on differentiable support vector function for visual recognition , 2018, Neurocomputing.
[3] Tinghuai Ma,et al. Graph classification based on graph set reconstruction and graph kernel feature reduction , 2018, Neurocomputing.
[4] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[5] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[6] Tanja Zseby,et al. Fuzzy classification boundaries against adversarial network attacks , 2019, Fuzzy Sets Syst..
[7] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[8] Minho Lee,et al. Deep learning with support vector data description , 2015, Neurocomputing.
[9] Kai Chen,et al. A hybrid approach combining an extended BBO algorithm with an intuitionistic fuzzy entropy weight method for QoS-aware manufacturing service supply chain optimization , 2018, Neurocomputing.
[10] Ezzeddine Zagrouba,et al. Abnormal behavior recognition for intelligent video surveillance systems: A review , 2018, Expert Syst. Appl..
[11] Sven Behnke,et al. Object class segmentation of RGB-D video using recurrent convolutional neural networks , 2017, Neural Networks.
[12] Laith Mohammad Abualigah,et al. Hybrid clustering analysis using improved krill herd algorithm , 2018, Applied Intelligence.
[13] Weisheng Chen,et al. Distributed Cooperative Learning Over Networks via Fuzzy Logic Systems: Performance Analysis and Comparison , 2018, IEEE Transactions on Fuzzy Systems.
[14] U. Raghavendra,et al. Automated detection and classification of liver fibrosis stages using contourlet transform and nonlinear features , 2018, Comput. Methods Programs Biomed..
[15] Mohammed Anbar,et al. Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection , 2018, Arabian Journal for Science and Engineering.
[16] Lin Wu,et al. Crossing Generative Adversarial Networks for Cross-View Person Re-identification , 2018, Neurocomputing.
[17] Witold Pedrycz,et al. Fuzzy Wavelet Polynomial Neural Networks: Analysis and Design , 2017, IEEE Transactions on Fuzzy Systems.
[18] Hau-San Wong,et al. Adaptive activation functions in convolutional neural networks , 2018, Neurocomputing.
[19] Alexander Binder,et al. Evaluating the Visualization of What a Deep Neural Network Has Learned , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[20] Ching-Chang Wong,et al. Evolutional RBFNs image model describing-based segmentation system designs , 2018, Neurocomputing.
[21] Mohammed Anbar,et al. Labeled flow-based dataset of ICMPv6-based DDoS attacks , 2019, Neural Computing and Applications.
[22] Guang-Hong Yang,et al. Neural-network-based adaptive fault-tolerant tracking control of uncertain nonlinear time-delay systems under output constraints and infinite number of actuator faults , 2018, Neurocomputing.
[23] Laith Mohammad Abualigah,et al. Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering , 2018, Studies in Computational Intelligence.
[24] Margaret Lech,et al. Evaluating deep learning architectures for Speech Emotion Recognition , 2017, Neural Networks.
[25] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[26] Mohammed Anbar,et al. Intrusion Detection Systems of ICMPv6-based DDoS attacks , 2016, Neural Computing and Applications.
[27] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[28] Cherukuri Aswani Kumar,et al. Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..
[29] Firas Najjar,et al. Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).
[30] Karim Afdel,et al. Semi-supervised machine learning approach for DDoS detection , 2018, Applied Intelligence.
[31] Mohammed Azmi Al-Betar,et al. Unsupervised Text Feature Selection Technique Based on Particle Swarm Optimization Algorithm for Improving the Text Clustering , 2017 .
[32] S. Shahrin,et al. A Framework of IPv6 Network Attack Dataset Construction by Using Testbed Environment , 2014 .
[33] Yan Li,et al. Finite-time adaptive fuzzy output-feedback control of MIMO nonlinear systems with hysteresis , 2018, Neurocomputing.
[34] Sung-Kwun Oh,et al. Hybrid fuzzy polynomial neural networks with the aid of weighted fuzzy clustering method and fuzzy polynomial neurons , 2017, Applied Intelligence.
[35] Sergio Salazar,et al. Takagi–Sugeno Dynamic Neuro-Fuzzy Controller of Uncertain Nonlinear Systems , 2017, IEEE Transactions on Fuzzy Systems.
[36] Yan Song,et al. A deep learning framework for identifying children with ADHD using an EEG-based brain network , 2019, Neurocomputing.
[37] S. Selvakumar,et al. Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks , 2019, Neurocomputing.
[38] Witold Pedrycz,et al. Hybrid Fuzzy Wavelet Neural Networks Architecture Based on Polynomial Neural Networks and Fuzzy Set/Relation Inference-Based Wavelet Neurons , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[39] Shengyong Chen,et al. Moving object detection via segmentation and saliency constrained RPCA , 2019, Neurocomputing.
[40] Elizabeth Chang,et al. Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment , 2019, Future Gener. Comput. Syst..
[41] Peng Wang,et al. Appearance based pedestrians' head pose and body orientation estimation using deep learning , 2018, Neurocomputing.
[42] Yang Yu,et al. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.
[43] I. Chairez,et al. Differential Neuro-Fuzzy Controller for Uncertain Nonlinear Systems , 2013, IEEE Transactions on Fuzzy Systems.
[44] Oscar Castillo,et al. Application of interval type-2 fuzzy neural networks in non-linear identification and time series prediction , 2013, Soft Computing.